Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09-07-2024 15:40
Static task
static1
Behavioral task
behavioral1
Sample
30f6c6fd2ac666b1a82cd00d59115992_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
30f6c6fd2ac666b1a82cd00d59115992_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
30f6c6fd2ac666b1a82cd00d59115992_JaffaCakes118.html
-
Size
53KB
-
MD5
30f6c6fd2ac666b1a82cd00d59115992
-
SHA1
2f40ffa159a56a33d7103b2ecf6488d3f8d52bcb
-
SHA256
4369a4aa610ce7105cdf1d985854bc42bf3f5509ed9076744a4b171c1d86ff84
-
SHA512
f673d9ed4372aede26c42eb8249973d53fb6e3b11b39558e9e250a8a21483c40a6e22ea09be28a274c8e11785bd106216412ccf79f4f29a893ef68f7df8f3a40
-
SSDEEP
1536:CkgUiIakTqGivi+PyUR5runlYh63Nj+q5Vy0R0w2AzTICbb8oC/t9M/dNwIUTDmG:CkgUiIakTqGivi+PyULrunlYh63Nj+qq
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426705008" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000fa7d0e6373f64fe5732a6ee9911e31bf63d89ba19ce137830c7cd64ee8f9a273000000000e800000000200002000000096519ac92ff87acfc0a97c530c40c33a2344f0e46d60f8609772d43978722b5020000000b42309ff08df086724f6369e21130f75f5899e1937579967eb1849deec5dfffa4000000093c7ee11de267b29740b0bf93330e534a014effe75fbd66764124aa2385a359f68bf2d063ee32ad0aa66464d1a6e3f78a0165ada3b3d91aeabbd21e9f07d0591 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0feda951ed2da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BE7C9AD1-3E11-11EF-BBF7-D6EBA8958965} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1880 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1880 iexplore.exe 1880 iexplore.exe 2464 IEXPLORE.EXE 2464 IEXPLORE.EXE 2464 IEXPLORE.EXE 2464 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1880 wrote to memory of 2464 1880 iexplore.exe 31 PID 1880 wrote to memory of 2464 1880 iexplore.exe 31 PID 1880 wrote to memory of 2464 1880 iexplore.exe 31 PID 1880 wrote to memory of 2464 1880 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\30f6c6fd2ac666b1a82cd00d59115992_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1880 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2464
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b98e4e84a5b52126d203417eee44f87b
SHA1caf8bd8c18b6abdd41a58d25b652dd5badea7721
SHA2566e6d03f15e39c3cdee5b387f8cdc77dd28923b733008349647101505656f31e4
SHA51209cc161c2971cf8a7dd866056081f791bdd04922a7c4fa081301ff82b3e0f4c5a0672acda4a558d818ab1f6cb4195044b773a14e8e150c5d965ccf98ce2f7622
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a307855f177ff28d45b7449cc4165ac5
SHA16807c097e4208b897a36bf6475b4cb9a124271f4
SHA256743af6626aa6440153155d4eea561c36f0d0ddc5ef738f4dd38664856e6eeff8
SHA512ecceb528074980acd515e5739e160340a003e26d07c0d954624249ff42f075b29dae74347337e246496cb98d92211bf8907791b42853076c7b1b52752b973e5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b273b8ce472716df75ac7092f76dd905
SHA11138b99996d4d76e5e7f314b873d683305a1c8f9
SHA256976482a046ffb9f143d10bef245bbf3805c5909adcb9b6cae6678775096b5aa4
SHA512065373895e0720d49e99b501d2d3c03552901dde28758845a120e7f0fe99875698379f8524f14cfd95eff31a159fd6b1a9c8d0ed4313c9257f4f2d5581343be3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54ca225e2b9d808cb0bf47c5dc778f2bb
SHA1f22b8de97bad7e96fc1a7dd1ec7b01ba93f9b7a5
SHA256c3b6803a03ba595f19a3ee679dbc9f999fdd25dc317ad8ec254bbe634fc4b3b7
SHA512c23891e4fee05b1154fc2bc46c3dfc346dba88b849ec9c0459ec7b39aa3aeacf80b6c65da503d2a036b611af8a16674c2a0c2f01ef3e524a0558bef4b9910695
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d1cde902275567e8e33972c19f83f733
SHA1dc793463cf087f95dd6106426745fd25733e2923
SHA2565fdc430153a033771f3d520351e312b0c8a5b72584185fd77b7eca644791aec5
SHA5128dfd2b07990a2f49b8b04e61638332085c3313512ac1f82084daab60209ee31652271f128fe943a1247ccbe220c58b7ec88117a126c2a92b0a789d4257d58dcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cffa7ebd76c4436ff82f86f250e17837
SHA1ef2dc7d1383da2bf89ae68400869629485a0a305
SHA25696a305931bebdb9caa3f4d25bcc204166a9a7743a1d22f8d3c42ff0b9fea5d0b
SHA512938a834e9facf6a7a226221446c38b600a6b1687f3f3ca92b673161cc758608bb7c7dffd470f8cde1a8d90dd904da6942b590d9d960c7fcc800bd9d04925cbf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52f36c367da84e69987b2bcf98cddc525
SHA14bd69a16a7157e7f9518042d470c04d165fb99f0
SHA2562bea18297157617fc66968ba3ab815d3d5b045ef1145d5609181703d1e9e73cd
SHA5128ec39f173f319f14b8eb9918a105593262e8097dd137f1c54c9e85b7123e84f4d7f179162b7b57ccdd634a572e5efacdea44aae4c05797090bfb0f5151db6428
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f700eb327a371045213e649c95306639
SHA1c0b240a1468b01732d91cc4d31ddceef1e23d2dc
SHA2564acb6454f431f601c59fdc6e4aa153346bc1d349c52429a063fde89c45499786
SHA512afa29b309eab17b2be5f2ae441e14afca3176a04e862dacaefd51668de64186a5cf1541655674b45300579a7bc3b32407cdca6b3592dc52c91d903240cdcf2c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57c9bc96cbc4c8da6eaa1b5b2a978c83d
SHA11c19745a4bca74c0a1856db8b0f91647b59ec500
SHA256dbd68d3159f471dbfc81f79ff097cc19a6448dc7312edf1bceb8ca728f4513d0
SHA512a9c45cdc27615d5960acb607ff9ef2ded719815404084f318893dbcd52aebd1407fe2faf67bcb303773b7e1f7b957a0e43243fe4af970e3faa0671ddb008f519
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51a194e35cb291b525d4f961c94e4e5f7
SHA1bd8ce9d77e7c3d3110727e64b8f7777586ea527d
SHA256df88fd599e199e3ebfe8c10b843157859ab88fe940c0a9699b7d246f1eb65ee3
SHA512c89b97f2c15e44d81babd4da44f7f1bb0dea322bed403affd2778c4aaea23eeeaac0c6f53c648b4379b949d73ba34a7d8dd2d4cb0a872bfd7acbfac40e51571c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5be06ca044284a454322a81cb0038ac45
SHA11b238cc705c1d9d1388270543cac3a5d46fb6f3c
SHA256b43003726e1172cd2c82cbf5aaaaf788af39d852bc808f297064dca2e88ae192
SHA51234992e6e22c4031d693d8bed2723804e659ad7a2ab0670d3ced12456ebbdabbf902dea5a246072295e4285f675f2ade2d79b57c9c4fd361f195881834c6e8cbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD550ad8ecf3c0155d238187874344f1f45
SHA1c26937b09d91134d260b5dd8e913b534f4e766ae
SHA256feadacc96593a5671bd3adfa8878dede06fca008a649b34c1789de73a1f26ded
SHA51215bbb21209d9b50817f5dfe0217aff467e2010203eef9d96d6d878c6617ee50919da706ec573a13605985d89b8f24dd119e921c24d016d64560b9a377006505c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c856b34f2cf9927faf3d61d77b1e4e87
SHA1cf016466b2c41017b130f2dfc206bf522b4fa1c1
SHA2560f0b7582d28cf9a55674dbca8b482592140d579aacc748373ec314dc9cb9ed5a
SHA51252055e89498bee1025163872f07d338977915180dd2e42f8ff269a42d217d70014154051e980d3a3a857e0fdf1070b8ca5dbce129fb656efb103e9d5e9138035
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD520cd647c9f78ec66432de2e7bead6fbe
SHA1530d4a9462ec1e407eae02ab9035c03e59d0d6ab
SHA256801260cd4527133fa00b1c6608d1d3d60c521cc9924f4c2f0aad36e235094b62
SHA5126196840a3ad2b9ab0f5d5b8d13f2f6d50fe89db866082b939346691a4f56dea2bcac03e0b48e6ec19794b56046a95d30b59e5db1702ae913ed1d5681977faf34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5556765ccc3bb613e7ed6269a65346ba8
SHA103e469dcc7d597e42bfeb80cfd074a855b8806e0
SHA256090f8e347c5709303ce6061e9d4fa554239d302ba7c008dd79fa4944fa5eb072
SHA512bf2fbc57b9c436e9ec77d52110f98358c41b019b15b338a85894e925c0b35eb6954f5527382df56445a3dcb690691c8b3aed66c2e7bbdcd2ad630a0ea5293b5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5dec52ea4866416688f0349f133d5373a
SHA120d82eb7e7a6a6b2b098441a5405df4589aa39e9
SHA256d97e5884b7151634c96a09fecfa773d43ab5b02eb6e9bde15bfec040ca24a442
SHA512b6e5d35a9b1fd45283f437447a582f793810abe10de706d1f7bc72c4b80ed2a60e740a02823c80932b83d60e7d4e7fd3e14e45720f08adc3313cbf9318274825
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a1996db4a6a2c7934f6a9967814b8bdd
SHA1c9d26e972df44072fff22b1c71e32f683e760c81
SHA256de71febf061784a4d4b349d2235097c5f3739b6becbd47e1ef99f4408723a043
SHA512df7ac2f9f9fb1c4667a49df7df766086e42629fc4c1776bdc5055db585b064e2adc6754b34884acb0c0f5e2f24ac34319ba9739a89533a3d6e7b9532b9b5c238
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2LF9I1AK\style[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b